Joe. a security analyst, recently performed a network discovery to fully understand his organization's electronic footprint from a "public" perspective. Joe ran a set of commands and received the following output: Which of the following can be determined about the organization's public presence and security posture? (Select TWO).
A. Joe used Who is to produce this output
B. Joe used cURL to produce this output
C. Joe used Wireshark to produce this output
D. The organization has adequate information available in public registration
E. The organization has too much information available in public registration
F. The organization has too little information available in public registration